Previous to my additional analysis into AI and quantum for my newest ebook, How AI and Quantum Impression Cyber Threats and Defenses, I had fairly strong password coverage suggestions:
- In case your password is actually random, then it needs to be 12+ characters or longer to struggle password hash cracking assaults
- In case your password is made up in your head or not really random, it must be 20+ characters or longer to struggle password guessing
I actually suppose it’s good to use PHISHING-RESISTANT MFA to guard beneficial information and programs, as main authentication, adopted by utilizing password managers (which extra simply create and use lengthy, really random passwords which are completely different for each website and repair you employ). And if and provided that you can not use MFA or a password supervisor, then make up an extended passphrase in your password (like rogerjumpsoverthebrowncow, and many others.). In any case, be certain that your passwords are distinctive for each website and repair.
I summarize that earlier password recommendation graphically like this beneath:

This prior coverage, which many individuals suppose requires passwords which are already too lengthy (or complicated), shouldn’t be adequate anymore!
(BTW, I agree that passwords we have to use are already too lengthy (and/or complicated), which is why I like to recommend utilizing MFA or a password supervisor as a substitute each time attainable.)
Within the strategy of writing my newest ebook, I had to consider how password coverage can be impacted by AI and quantum assaults.
First, you will need to perceive that the majority password assaults don’t care concerning the size or complexity of your password, or whether or not it’s distinctive or re-used in every single place. Most passwords are stolen utilizing social engineering or unpatched vulnerabilities the place the password is stolen. Your password will be good or unhealthy, however if you happen to give it to the hacker or allow them to steal it, who cares.
There are solely two kinds of password assaults that care whether or not your password is robust or not:
- Guessing towards a web based login display
- Guessing/cracking a stolen password hash
To stop somebody from guessing your password or cracking your password’s stolen hash, the very best protection is to make use of a really random password (e.g., xrhjwwLv7ocvFEW9eCW9, r?K2Xrki2N_Mv(3FBVmPK4b and many others.). So far as I do know, nobody, even utilizing great cloud computing sources has ever damaged an 11-character lengthy really random password, so utilizing 12-characters or longer really random passwords needs to be ample.
There may be all the time an opportunity that some nation-state might have great computing capability to interrupt even 12-character or longer really random passwords, however they don’t seem to be publicly recognized about and let’s be actual, if a nation-state needs to hack you or your password, they will ultimately achieve success it doesn’t matter what you do. My password coverage recommendation is for defenses towards most assaults.
A significant a part of the willpower {that a} 12-character absolutely random password can be sufficiently proof against assault is the info from this desk beneath, taken from https://t.co/NKYIrKwUDb. This information is the very best information on password hash cracking I’ve been capable of finding, despite the fact that it’s a bit outdated, from 2019. It entails an enormous password hash cracking “rig” with 448 GPUs. It is ready to do 31.8 trillion guesses at NTLM password hashes per second! That’s fairly quick, though sooner password hash cracking rigs can be found.

It reveals that one thing mathematically unbelievable occurs between 11-character really random passwords and 12 characters. Even if in case you have a far sooner password cracking rig…say 100 trillion guesses a second concerned, it will take a hacker a 12 months or longer to crack it. First, they should steal your password hash (no small enterprise by itself), then topic it to a reasonably intense password cracking assault with substantial sources. In case you suppose {that a} hacker could determine to place the sources of 100 trillion guesses or extra towards your password, simply make your password longer.
My password supervisor tries to create 20-character really random passwords by default, however I’ve to shorten them to “solely” 16-characters and take away robust complexity so that the majority web sites and companies will settle for them. Though I have no idea for certain (as a result of I don’t work on the NSA), a 20-character really random password is prone to be uncrackable even for nation-states.
That handles password hash cracking protection.
How lengthy (and/or complicated) does your password should be to forestall on-line password guessing assaults?
Observe: For password guessing assault defenses, we are going to assume that the defender has no mechanisms to detect and cease a number of on-line password guessing makes an attempt…only for our evaluation, and in addition, as a result of that’s typically true.
Effectively, the longest, most complicated on-line password-guessing assault made public that I’m conscious of is an assault that cracked the 10-character “supposedly complicated” password ‘Welkcom2020’. The attacker was in a position to guess on the password over 100,000 a day for over a 12 months. That sufferer firm had very poor controls.
I’m certain that longer and extra complicated passwords have been guessed efficiently by real-world hackers towards on-line portals, however that is the longest and most complicated password I’ve seen shared publicly.
I do know of {many professional} penetration firms that routinely guess at human-created passwords (from their retrieved hashes) as much as 18-characters containing average complexity (i.e., positioned on the finish utilizing the usually used “complexity” characters). Sure, password hash crackers ROUTINELY crack human-created passwords as much as 18 characters.
I’ve by no means heard of a password guesser that cracked something larger, however you must assume the nation-state-level guessers might guess longer passwords. That’s the reason I’ve, for years, really helpful that human-created passwords be 20-characters or longer for robust safety. Go longer if you happen to want extra safety.
So, that’s how I got here up with my long-standing earlier password coverage: 12-character or longer for really random passwords or 20-character or longer human-created or non-random passwords.
Right here is my authentic password coverage recommendation whitepaper from a couple of years in the past discussing the varied assaults and my suggestions on the time.
AI and quantum assaults imply you want longer passwords.
How Does AI Impression Password Guessing/Cracking?
AI is pattern-matching software program. It’s good at discovering and making sense of patterns. Even when one thing seems to be random to us, if it has a sample, AI goes to enhance it. So, if you happen to create human-generated passwords or passwords of any kind that aren’t really random, AI-enabled password guessers and crackers will doubtless assist.
The query is how a lot?
Let me begin by saying there’s completely no publicly out there GREAT information (but) exhibiting how a lot sooner an AI-enabled password guessing/cracking software will be at cracking at present’s normal-sized and complexity passwords (i.e., 12 characters with some complexity). One of the best information now we have is a couple of older analysis research utilizing AI-enabled password hash cracking instruments towards smaller passwords (8 characters or so).
One used the AI-enabled password cracking software, PassGAN (https://github.com/d4ichi/ PassGAN), in 2017. In keeping with researchers, PassGAN was capable of finding 51%-73% extra passwords than the most well-liked, non-AI password hash cracking software (i.e., hashcat) alone. PassGAN’s outcomes have been a lot criticized on the time (together with by me) for a couple of causes, together with that the testing was too restricted and principally examined for brief passwords. These criticisms stay.
However different later analysis in 2025 involving utilizing one other AI-enabled password hash cracking software, PassLLM, got here up with extra nuisance password guessing enhancements from a couple of p.c to as much as a 3rd higher, relying on the state of affairs.
So, now we have not less than two AI-enabled password hash cracking exams, and each level to sooner password hash cracking on older, however real-world passwords. What they didn’t present or reveal was how a lot sooner AI-enabled instruments have been in a position to crack present password hashes over common password cracking instruments. They as a substitute confirmed what number of further passwords they have been in a position to crack in a given time interval in comparison with the non-AI password-cracking software. That’s barely completely different.
However I checked out all of the out there information in each papers, and greatest as I might inform (as a non-expert) is that the AI-enabled password cracking software appeared to carry out at a charge equal to lowering password power by two to 5 characters. So, if I beforehand really helpful 20-character or longer passwords for human-generated (or non-random) passwords, my new password coverage suggestion can be for 25-character or longer passwords (or passphrases).
Sure, that’s so, so lengthy. I agree. Use MFA or a password supervisor as a substitute with really random passwords 25-characters or longer.
AI can’t assist with any really random job. If it doesn’t have a sample, AI can’t assist. Thus, AI can’t assist guess or crack really random passwords or hashes.
However quantum can.
How Does Quantum Impression Password Guessing/Cracking?
Quantum shouldn’t be essentially higher at cracking passwords with patterns, however it’s at guessing/cracking really random passwords. That’s as a result of one of many two greatest quantum algorithms recognized at present, Grover’s algorithm (the opposite is Shor’s algorithm), is sweet at fixing random-type issues. The official approach they are saying it’s that Grover’s is sweet at fixing “unstructured, unordered, blackbox” issues. That’s the official approach of claiming really random options.
Grover’s algorithm offers a quadratic speed-up in fixing random issues, like attempting to crack or guess really random passwords (or symmetric keys or hashes). Grover’s algorithm, paired with sufficiently-capable quantum computer systems, requires that symmetric encryption keys be twice as lengthy to offer the identical stage of safety as they did earlier than sufficiently-capable quantum computer systems have been used. Logically, the identical will be mentioned of really random passwords or hashes.
If it used to take 12-character or longer really random passwords to be safe, now you want 25-character really random passwords.
The large caveat is that to ensure that Grover’s algorithm to do its factor, we’d like “sufficiently-capable” quantum computer systems, which we wouldn’t have but. Sufficiently-capable means quantum computer systems able to fixing the arduous issues we’re placing them towards, which on this case, means really random passwords. To ensure that Grover’s algorithm to begin cracking at present’s really random passwords, a quantum laptop in all probability wants about 8000-9000 steady, entangled qubits. We’re not there but (that we publicly know of), however we’re prone to be there within the subsequent few years. IONQ, one quantum laptop vendor, says it’s going to have 8,000 steady entangled qubits by 2029 and 800,000 steady entangled qubits by 2030. So, sufficiently-capable quantum computer systems are doubtless across the nook.
What Your New Password Coverage Ought to Be
My new password coverage, contemplating the influence of AI and quantum, is graphically represented beneath:

So, in conclusion, the introduction of AI and quantum have considerably eliminated the excellence between really random and non-random passwords. I used to say 12 characters or longer for really random passwords and 20 characters for non-random passwords. Now, it’s 24 characters or longer for really random passwords and 25 characters or longer for non-random passwords. That’s primarily the identical. Let’s simply say 25 characters or longer irrespective of whether or not your password is actually random or not.
If you wish to get choosy, you don’t want really random passwords to be longer than 12 characters till sufficiently-capable quantum computer systems get right here. So, you’ll have one to 3 years till that requirement. However since we have no idea when sufficiently-capable quantum computer systems will get right here (they might already be right here), why not simply begin utilizing 25-character (or longer) passwords, whether or not they’re really random or not.
After all, an enormous caveat in all of this are programs which are able to accepting 25-character or longer passwords. Most web sites and companies I’m conscious of don’t. So, we have to begin pestering our website and repair distributors to begin permitting longer passwords. The AI period is right here. The quantum-era is both right here or practically right here. It’s time to begin appearing prefer it.
And don’t get me began about how quantum AI will influence issues, though I do have an entire chapter dedicated to that topic in my new ebook.
